diff --git a/Jenkinsfile b/Jenkinsfile
index c4b3d95b627f0dd4a29787b6aa0f8223d04ddc6c..d6819e5cac43482fdd4701a1a06d298555e55806 100644
--- a/Jenkinsfile
+++ b/Jenkinsfile
@@ -1,7 +1,7 @@
 pipeline {
     agent {
         node {
-            label 'jenkins-quarkus-build-agent'
+            label 'ozgcloud-jenkins-build-agent'
         }
     }
 
@@ -63,7 +63,7 @@ pipeline {
                 }
 
                 configFileProvider([configFile(fileId: 'maven-settings', variable: 'MAVEN_SETTINGS')]) {
-                    sh './mvnw -pl user-manager-interface -s $MAVEN_SETTINGS clean deploy -Dmaven.wagon.http.retryHandler.count=3'
+                    sh 'mvn -pl user-manager-interface -s $MAVEN_SETTINGS clean deploy -Dmaven.wagon.http.retryHandler.count=3'
                 }
             }
         }
@@ -74,7 +74,7 @@ pipeline {
                     FAILED_STAGE=env.STAGE_NAME
 
                     configFileProvider([configFile(fileId: 'maven-settings', variable: 'MAVEN_SETTINGS')]) {
-                        sh './mvnw -pl user-manager-server -s $MAVEN_SETTINGS clean deploy -Dmaven.wagon.http.retryHandler.count=3'
+                        sh 'mvn -pl user-manager-server -s $MAVEN_SETTINGS clean deploy -Dmaven.wagon.http.retryHandler.count=3'
                         junit testResults: '**/target/surefire-reports/*.xml', skipPublishingChecks: true
                     }
                 }
@@ -88,7 +88,7 @@ pipeline {
 
                     withCredentials([usernamePassword(credentialsId: 'jenkins-nexus-login', usernameVariable: 'USER', passwordVariable: 'PASSWORD')]) {
                         configFileProvider([configFile(fileId: 'maven-settings', variable: 'MAVEN_SETTINGS')]) {
-                            sh './mvnw -pl user-manager-server -s $MAVEN_SETTINGS clean verify -Pnative -Dquarkus.container-image.registry=docker.ozg-sh.de -Dquarkus.container-image.username=${USER} -Dquarkus.container-image.password=${PASSWORD} -Dquarkus.container-image.push=true -Dquarkus.container-image.build=true -Dquarkus.native.remote-container-build=true -Dmaven.wagon.http.retryHandler.count=3'
+                            sh 'mvn -pl user-manager-server -s $MAVEN_SETTINGS clean verify -Pnative -Dquarkus.container-image.registry=docker.ozg-sh.de -Dquarkus.container-image.username=${USER} -Dquarkus.container-image.password=${PASSWORD} -Dquarkus.container-image.push=true -Dquarkus.container-image.build=true -Dquarkus.native.remote-container-build=true -Dmaven.wagon.http.retryHandler.count=3'
                         }
                     }
                 }
@@ -96,9 +96,6 @@ pipeline {
         }
 
         stage ('OWASP Dependency-Check Vulnerabilities') {
-            when {
-                branch 'master'
-            }
             steps {
                 dependencyCheck additionalArguments: '''
                         -o "./"
@@ -107,6 +104,7 @@ pipeline {
                         -d /dependency-check-data
                         --suppression dependency-check-supressions.xml
                         --disableKnownExploited
+                        --noupdate
                         --disableArchive
                         --prettyPrint''', odcInstallation: 'dependency-check-owasp'
 
@@ -126,7 +124,7 @@ pipeline {
                         dir('user-manager-server') {
                             try {
                                 withSonarQubeEnv('sonarqube-ozg-sh'){
-                                    sh "./mvnw -s $MAVEN_SETTINGS package sonar:sonar -Dsonar.coverage.jacoco.xmlReportPaths=${env.WORKSPACE}/user-manager-server/target/jacoco-report/jacoco.xml"
+                                    sh "mvn -s $MAVEN_SETTINGS package sonar:sonar -Dsonar.coverage.jacoco.xmlReportPaths=${env.WORKSPACE}/user-manager-server/target/jacoco-report/jacoco.xml"
                                 }
                             } catch (Exception e) {
                                 unstable("SonarQube failed")
diff --git a/pom.xml b/pom.xml
index edf02f448e14745fe9311e823868dfe85f63b474..d7ed9abe2cc7607a2640e3e17b7a855fd48fd430 100644
--- a/pom.xml
+++ b/pom.xml
@@ -29,15 +29,15 @@
 	xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
 
 	<parent>
-		<groupId>de.itvsh.kop.common</groupId>
-		<artifactId>kop-common-dependencies</artifactId>
-		<version>2.3.1</version>
+		<groupId>de.ozgcloud.common</groupId>
+		<artifactId>ozgcloud-common-dependencies</artifactId>
+		<version>3.0.0</version>
 	</parent>
 
 	<modelVersion>4.0.0</modelVersion>
 	<groupId>de.ozgcloud.user</groupId>
 	<artifactId>user-manager</artifactId>
-	<version>2.0.0-SNAPSHOT</version>
+	<version>2.1.0-SNAPSHOT</version>
 	<name>OZG-Cloud User Manager</name>
 	<packaging>pom</packaging>
 
@@ -46,7 +46,7 @@
 		<project.reporting.outputEncoding>UTF-8</project.reporting.outputEncoding>
 
 		<quarkus.platform.version>3.5.0</quarkus.platform.version>
-		<kop.license.version>1.3.0</kop.license.version>
+		<ozgcloud.license.version>1.3.0</ozgcloud.license.version>
 		<jakarta.interceptor.version>2.1.0</jakarta.interceptor.version>
 		<jakarta.annotatioin.version>2.1.1</jakarta.annotatioin.version>
 		<lombok.version>1.18.24</lombok.version>
@@ -138,9 +138,9 @@
 					</configuration>
 					<dependencies>
 						<dependency>
-							<groupId>de.itvsh.kop.common</groupId>
-							<artifactId>kop-common-license</artifactId>
-							<version>${kop.license.version}</version>
+							<groupId>de.ozgcloud.common</groupId>
+							<artifactId>ozgcloud-common-license</artifactId>
+							<version>${ozgcloud.license.version}</version>
 						</dependency>
 					</dependencies>
 				</plugin>
diff --git a/src/main/helm/templates/network_policy.yaml b/src/main/helm/templates/network_policy.yaml
index 104939f0714adf8706a379ca0e686ff762453c8d..e8a339f4fd8344ec1e426ecc3b7fc6452eb06fb3 100644
--- a/src/main/helm/templates/network_policy.yaml
+++ b/src/main/helm/templates/network_policy.yaml
@@ -45,7 +45,7 @@ spec:
   - to:
     - podSelector:
         matchLabels:
-          component: ozg-mongodb
+          component: ozgcloud-mongodb
     ports:
       - port: 27017
         protocol: TCP
diff --git a/src/main/helm/templates/ozg_operator_secrets_read_role.yaml b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role.yaml
similarity index 84%
rename from src/main/helm/templates/ozg_operator_secrets_read_role.yaml
rename to src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role.yaml
index 72c233c8a71e1f20c4cb36e6632011775c20c193..02f30c4d6e6e6e12209b0832495852dbc4f58497 100644
--- a/src/main/helm/templates/ozg_operator_secrets_read_role.yaml
+++ b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role.yaml
@@ -2,7 +2,7 @@
 apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
-  name: ozg-operator-secrets-read-role-user-manager
+  name: ozgcloud-keycloak-operator-secrets-read-role-user-manager
   namespace: {{ include "app.namespace" $ }}
 rules:
   - apiGroups:
diff --git a/src/main/helm/templates/ozg_operator_secrets_read_role_binding.yaml b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role_binding.yaml
similarity index 64%
rename from src/main/helm/templates/ozg_operator_secrets_read_role_binding.yaml
rename to src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role_binding.yaml
index eeb9eb0c9592ba8a8c461dacbbe9451971c80aba..fdcf591e4bce23591d62e06622edccaaf81e7821 100644
--- a/src/main/helm/templates/ozg_operator_secrets_read_role_binding.yaml
+++ b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_read_role_binding.yaml
@@ -2,14 +2,14 @@
 apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
-  name: ozg-operator-secrets-read-role-binding-user-manager
+  name: ozgcloud-keycloak-operator-secrets-read-role-binding-user-manager
   namespace: {{ include "app.namespace" . }}
 subjects:
   - kind: ServiceAccount
-    name: ozg-operator-serviceaccount
+    name: ozgcloud-keycloak-operator-serviceaccount
     namespace: {{ required "sso.operatorNamespace muss angegeben sein" .Values.sso.operatorNamespace }}
 roleRef:
   kind: Role
-  name: ozg-operator-secrets-read-role-user-manager
+  name: ozgcloud-keycloak-operator-secrets-read-role-user-manager
   apiGroup: rbac.authorization.k8s.io
 {{- end }}
\ No newline at end of file
diff --git a/src/main/helm/templates/ozg_operator_secrets_write_role.yaml b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role.yaml
similarity index 78%
rename from src/main/helm/templates/ozg_operator_secrets_write_role.yaml
rename to src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role.yaml
index b4b25822f9f5495046a47aff5c20859e389fc253..f5f02cf36921c472bee3e8ad5a33cc90ee69c9b1 100644
--- a/src/main/helm/templates/ozg_operator_secrets_write_role.yaml
+++ b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role.yaml
@@ -2,7 +2,7 @@
 apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
-  name: ozg-operator-secrets-write-role-user-manager
+  name: ozgcloud-keycloak-operator-secrets-write-role-user-manager
   namespace: {{ include "app.namespace" $ }}
 rules:
   - apiGroups:
diff --git a/src/main/helm/templates/ozg_operator_secrets_write_role_binding.yaml b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role_binding.yaml
similarity index 64%
rename from src/main/helm/templates/ozg_operator_secrets_write_role_binding.yaml
rename to src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role_binding.yaml
index 84d879684ce3e7ddc07a5f378c576c9aeaab90c5..ad6a1e1141feb98aa4e9df6eda829149347dd4f4 100644
--- a/src/main/helm/templates/ozg_operator_secrets_write_role_binding.yaml
+++ b/src/main/helm/templates/ozgcloud_keycloak_operator_secrets_write_role_binding.yaml
@@ -2,14 +2,14 @@
 apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
-  name: ozg-operator-secrets-write-role-binding-user-manager
+  name: ozgcloud-keycloak-operator-secrets-write-role-binding-user-manager
   namespace: {{ include "app.namespace" . }}
 subjects:
   - kind: ServiceAccount
-    name: ozg-operator-serviceaccount
+    name: ozgcloud-keycloak-operator-serviceaccount
     namespace: {{ required "sso.operatorNamespace muss angegeben sein" .Values.sso.operatorNamespace }}
 roleRef:
   kind: Role
-  name: ozg-operator-secrets-write-role-user-manager
+  name: ozgcloud-keycloak-operator-secrets-write-role-user-manager
   apiGroup: rbac.authorization.k8s.io
 {{- end }}
\ No newline at end of file
diff --git a/src/test/helm/network_policy_test.yaml b/src/test/helm/network_policy_test.yaml
index a4c438630fadb4c135c8f1ca774d0be14e136254..ed301b85485858a7b7c41b758b8a9adda4f12001 100644
--- a/src/test/helm/network_policy_test.yaml
+++ b/src/test/helm/network_policy_test.yaml
@@ -61,7 +61,7 @@ tests:
             - to:
               - podSelector: 
                   matchLabels:
-                    component: ozg-mongodb
+                    component: ozgcloud-mongodb
               ports:
                 - port: 27017
                   protocol: TCP
diff --git a/src/test/helm/ozg_operator_secrets_write_role_binding_test.yaml b/src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_binding_test.yaml
similarity index 79%
rename from src/test/helm/ozg_operator_secrets_write_role_binding_test.yaml
rename to src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_binding_test.yaml
index 3074359a849c64ed470424e5e1535f2c6b984b7d..3acc4647aae75a30637491d988d399085b6a276a 100644
--- a/src/test/helm/ozg_operator_secrets_write_role_binding_test.yaml
+++ b/src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_binding_test.yaml
@@ -1,9 +1,9 @@
-suite: test ozg_operator_secrets_role_binding
+suite: test ozgcloud_keycloak_operator_secrets_read_role_binding
 release:
   name: alfa
   namespace: by-helm-test
 templates:
-  - templates/ozg_operator_secrets_write_role_binding.yaml
+  - templates/ozgcloud_keycloak_operator_secrets_read_role_binding.yaml
 tests:
   - it: should contain header data
     set:
@@ -25,7 +25,7 @@ tests:
     asserts:
       - equal:
           path: metadata.name
-          value: ozg-operator-secrets-write-role-binding-user-manager
+          value: ozgcloud-keycloak-operator-secrets-read-role-binding-user-manager
       - equal:
           path: metadata.namespace
           value: by-helm-test
@@ -40,7 +40,7 @@ tests:
           path: subjects
           content:
             kind: ServiceAccount
-            name: ozg-operator-serviceaccount
+            name: ozgcloud-keycloak-operator-serviceaccount
             namespace: test-operator-namespace
   - it: should have roleRef values
     set:
@@ -54,7 +54,7 @@ tests:
           value: Role
       - equal:
           path: roleRef.name
-          value: ozg-operator-secrets-write-role-user-manager
+          value: ozgcloud-keycloak-operator-secrets-read-role-user-manager
       - equal:
           path: roleRef.apiGroup
           value: rbac.authorization.k8s.io
diff --git a/src/test/helm/ozg_operator_secrets_read_role_test.yaml b/src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_test.yaml
similarity index 84%
rename from src/test/helm/ozg_operator_secrets_read_role_test.yaml
rename to src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_test.yaml
index 2f1468152fbfe6bfbde2f651208cbac7dca7ec46..4464f2f2ede235ba32da45a0dcfc10e2aa582c9b 100644
--- a/src/test/helm/ozg_operator_secrets_read_role_test.yaml
+++ b/src/test/helm/ozgcloud_keycloak_operator_secrets_read_role_test.yaml
@@ -1,9 +1,9 @@
-suite: test ozg_operator_secrets_read_role
+suite: test ozgcloud_keycloak_operator_secrets_read_role
 release:
   name: alfa
   namespace: by-helm-test
 templates:
-  - templates/ozg_operator_secrets_read_role.yaml
+  - templates/ozgcloud_keycloak_operator_secrets_read_role.yaml
 tests:
   - it: should contain header data
     set:
@@ -23,7 +23,7 @@ tests:
     asserts:
       - equal:
           path: metadata.name
-          value: ozg-operator-secrets-read-role-user-manager
+          value: ozgcloud-keycloak-operator-secrets-read-role-user-manager
       - equal:
           path: metadata.namespace
           value: by-helm-test
diff --git a/src/test/helm/ozg_operator_secrets_read_role_binding_test.yaml b/src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_binding_test.yaml
similarity index 79%
rename from src/test/helm/ozg_operator_secrets_read_role_binding_test.yaml
rename to src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_binding_test.yaml
index 0f5af4d7917005c4a75a99aa646e35b61de4a33d..0522ac029b8512e76e162023cbaa0d5ade5d9af2 100644
--- a/src/test/helm/ozg_operator_secrets_read_role_binding_test.yaml
+++ b/src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_binding_test.yaml
@@ -1,9 +1,9 @@
-suite: test ozg_operator_secrets_read_role_binding
+suite: test ozgcloud_keycloak_operator_secrets_role_binding
 release:
   name: alfa
   namespace: by-helm-test
 templates:
-  - templates/ozg_operator_secrets_read_role_binding.yaml
+  - templates/ozgcloud_keycloak_operator_secrets_write_role_binding.yaml
 tests:
   - it: should contain header data
     set:
@@ -25,7 +25,7 @@ tests:
     asserts:
       - equal:
           path: metadata.name
-          value: ozg-operator-secrets-read-role-binding-user-manager
+          value: ozgcloud-keycloak-operator-secrets-write-role-binding-user-manager
       - equal:
           path: metadata.namespace
           value: by-helm-test
@@ -40,7 +40,7 @@ tests:
           path: subjects
           content:
             kind: ServiceAccount
-            name: ozg-operator-serviceaccount
+            name: ozgcloud-keycloak-operator-serviceaccount
             namespace: test-operator-namespace
   - it: should have roleRef values
     set:
@@ -54,7 +54,7 @@ tests:
           value: Role
       - equal:
           path: roleRef.name
-          value: ozg-operator-secrets-read-role-user-manager
+          value: ozgcloud-keycloak-operator-secrets-write-role-user-manager
       - equal:
           path: roleRef.apiGroup
           value: rbac.authorization.k8s.io
diff --git a/src/test/helm/ozg_operator_secrets_write_role_test.yaml b/src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_test.yaml
similarity index 82%
rename from src/test/helm/ozg_operator_secrets_write_role_test.yaml
rename to src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_test.yaml
index 215f844ac8bf083005d8ca12441e0fcd9d58cf4e..f5a365040075125f0a02784ee1e800f97561456f 100644
--- a/src/test/helm/ozg_operator_secrets_write_role_test.yaml
+++ b/src/test/helm/ozgcloud_keycloak_operator_secrets_write_role_test.yaml
@@ -1,9 +1,9 @@
-suite: test ozg_operator_secrets_write_role
+suite: test ozgcloud_keycloak_operator_secrets_write_role
 release:
   name: alfa
   namespace: by-helm-test
 templates:
-  - templates/ozg_operator_secrets_write_role.yaml
+  - templates/ozgcloud_keycloak_operator_secrets_write_role.yaml
 tests:
   - it: should contain header data
     set:
@@ -23,7 +23,7 @@ tests:
     asserts:
       - equal:
           path: metadata.name
-          value: ozg-operator-secrets-write-role-user-manager
+          value: ozgcloud-keycloak-operator-secrets-write-role-user-manager
       - equal:
           path: metadata.namespace
           value: by-helm-test
diff --git a/user-manager-interface/pom.xml b/user-manager-interface/pom.xml
index 2ea405736404bf88977ee35d129ea524dcdd2777..045d03c48e421c37518e571da88ab350a76dc283 100644
--- a/user-manager-interface/pom.xml
+++ b/user-manager-interface/pom.xml
@@ -32,7 +32,7 @@
 	<parent>
 		<groupId>de.ozgcloud.user</groupId>
 		<artifactId>user-manager</artifactId>
-		<version>2.0.0-SNAPSHOT</version>
+		<version>2.1.0-SNAPSHOT</version>
 	</parent>
 
 	<artifactId>user-manager-interface</artifactId>
diff --git a/user-manager-server/pom.xml b/user-manager-server/pom.xml
index 8f8d0a46a0a9321c25b1bcf0b49af305247c9de5..578993752d7ae2fa1307629afb210f00d35c69ad 100644
--- a/user-manager-server/pom.xml
+++ b/user-manager-server/pom.xml
@@ -31,7 +31,7 @@
 	<parent>
 		<groupId>de.ozgcloud.user</groupId>
 		<artifactId>user-manager</artifactId>
-		<version>2.0.0-SNAPSHOT</version>
+		<version>2.1.0-SNAPSHOT</version>
 	</parent>
 
 	<artifactId>user-manager-server</artifactId>
@@ -47,8 +47,8 @@
 			<artifactId>user-manager-interface</artifactId>
 		</dependency>
 		<dependency>
-			<groupId>de.itvsh.kop.common</groupId>
-			<artifactId>kop-common-lib</artifactId>
+			<groupId>de.ozgcloud.common</groupId>
+			<artifactId>ozgcloud-common-lib</artifactId>
 			<exclusions>
 				<exclusion>
 					<groupId>org.apache.logging.log4j</groupId>
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/UserProfileResource.java b/user-manager-server/src/main/java/de/ozgcloud/user/UserProfileResource.java
index 6e94022046153760096a9b1dfaa8643ee849b6da..7109effbb68ce67c4608278f232c4cd05a85aeed 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/UserProfileResource.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/UserProfileResource.java
@@ -26,6 +26,12 @@ package de.ozgcloud.user;
 import java.util.Optional;
 import java.util.stream.Stream;
 
+import org.eclipse.microprofile.config.inject.ConfigProperty;
+import org.jboss.resteasy.reactive.common.util.RestMediaType;
+
+import de.ozgcloud.common.logging.OzgCloudLogging;
+import io.quarkus.hal.HalCollectionWrapper;
+import io.quarkus.hal.HalEntityWrapper;
 import jakarta.inject.Inject;
 import jakarta.ws.rs.GET;
 import jakarta.ws.rs.Path;
@@ -34,14 +40,7 @@ import jakarta.ws.rs.Produces;
 import jakarta.ws.rs.QueryParam;
 import jakarta.ws.rs.core.MediaType;
 
-import org.eclipse.microprofile.config.inject.ConfigProperty;
-import org.jboss.resteasy.reactive.common.util.RestMediaType;
-
-import de.itvsh.kop.common.logging.KopLogging;
-import io.quarkus.hal.HalCollectionWrapper;
-import io.quarkus.hal.HalEntityWrapper;
-
-@KopLogging
+@OzgCloudLogging
 @Path(UserProfileResource.USERS_PATH)
 public class UserProfileResource {
 	static final String PARAM_SEARCH_BY = "searchBy";
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/UserRepository.java b/user-manager-server/src/main/java/de/ozgcloud/user/UserRepository.java
index b13ef3cf5b5cfd05f4dc037e426abaa693d1f624..56f1b35b720162cdefd35edec85cc220787990de 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/UserRepository.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/UserRepository.java
@@ -28,17 +28,16 @@ import static de.ozgcloud.user.User.*;
 import java.util.Optional;
 import java.util.stream.Stream;
 
-import jakarta.enterprise.context.ApplicationScoped;
-
 import org.bson.types.ObjectId;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.common.errorhandling.ResourceNotFoundException;
 import io.quarkus.mongodb.panache.PanacheMongoRepository;
 import io.quarkus.panache.common.Parameters;
+import jakarta.enterprise.context.ApplicationScoped;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class UserRepository implements PanacheMongoRepository<User> {
 
 	static final String PARAM_NAME_SEARCH_BY = "searchBy";
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/UserService.java b/user-manager-server/src/main/java/de/ozgcloud/user/UserService.java
index ee505dd992fbf2213a40b930c520b0c2183388c3..deab57205f2d89612c0bbe2b5d8f5f71f69a02d4 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/UserService.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/UserService.java
@@ -26,20 +26,19 @@ package de.ozgcloud.user;
 import java.util.Optional;
 import java.util.stream.Stream;
 
-import de.ozgcloud.user.common.errorhandling.TechnicalException;
-import de.ozgcloud.user.keycloak.KeycloakUserRemoteService;
-import jakarta.enterprise.context.ApplicationScoped;
-import jakarta.inject.Inject;
-
 import org.apache.commons.lang3.StringUtils;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.common.errorhandling.ResourceNotFoundException;
+import de.ozgcloud.user.common.errorhandling.TechnicalException;
+import de.ozgcloud.user.keycloak.KeycloakUserRemoteService;
 import io.smallrye.mutiny.Uni;
 import io.smallrye.mutiny.infrastructure.Infrastructure;
+import jakarta.enterprise.context.ApplicationScoped;
+import jakarta.inject.Inject;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 public class UserService {
 
 	@Inject
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/AccessForbiddenException.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/AccessForbiddenException.java
index 471b24a9d961702a0230f771822b8490c9483ea4..20867afe2873e5510fb909ce904b4bd8ea77d11f 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/AccessForbiddenException.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/AccessForbiddenException.java
@@ -23,7 +23,7 @@
  */
 package de.ozgcloud.user.common.errorhandling;
 
-import de.itvsh.kop.common.errorhandling.FunctionalErrorCode;
+import de.ozgcloud.common.errorhandling.FunctionalErrorCode;
 
 public class AccessForbiddenException extends FunctionalException {
 	private static final long serialVersionUID = 1L;
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ApiErrorUtil.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ApiErrorUtil.java
index ae340c425aa2406be44476251ea6bfbb32f9790f..957dbdb5eaeceba0c05a896b86e34de9faa7d1b4 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ApiErrorUtil.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ApiErrorUtil.java
@@ -25,10 +25,9 @@ package de.ozgcloud.user.common.errorhandling;
 
 import java.util.UUID;
 
+import de.ozgcloud.common.errorhandling.ExceptionUtil;
 import jakarta.enterprise.context.ApplicationScoped;
 import jakarta.ws.rs.NotFoundException;
-
-import de.itvsh.kop.common.errorhandling.ExceptionUtil;
 import lombok.extern.log4j.Log4j2;
 
 @Log4j2
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/FunctionalException.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/FunctionalException.java
index f6a5819ec2d399e911c7c29bd2b5682184154522..22829670b0d70d3891c57fd4ab23e1a9bca74109 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/FunctionalException.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/FunctionalException.java
@@ -23,12 +23,12 @@
  */
 package de.ozgcloud.user.common.errorhandling;
 
-import de.itvsh.kop.common.errorhandling.ExceptionUtil;
-import de.itvsh.kop.common.errorhandling.FunctionalErrorCode;
-import de.itvsh.kop.common.errorhandling.IdentifiableException;
-
 import java.util.UUID;
 
+import de.ozgcloud.common.errorhandling.ExceptionUtil;
+import de.ozgcloud.common.errorhandling.FunctionalErrorCode;
+import de.ozgcloud.common.errorhandling.IdentifiableException;
+
 public class FunctionalException extends RuntimeException implements IdentifiableException {
 
 	private static final long serialVersionUID = 1L;
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ResourceNotFoundException.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ResourceNotFoundException.java
index dda73e7fbbf3af9cedffd1126f05120f5730aded..dba1b68a1022debfb503898f8d5fdec43c86ceb8 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ResourceNotFoundException.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/errorhandling/ResourceNotFoundException.java
@@ -23,7 +23,7 @@
  */
 package de.ozgcloud.user.common.errorhandling;
 
-import de.itvsh.kop.common.errorhandling.FunctionalErrorCode;
+import de.ozgcloud.common.errorhandling.FunctionalErrorCode;
 import lombok.Getter;
 
 @Getter
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockRepository.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockRepository.java
index bfc94d6c96053ce7bf2a217bc033003b34688934..64c9dd71186b04be92ac49cf9e8563f10cbcb613 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockRepository.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockRepository.java
@@ -26,13 +26,12 @@ package de.ozgcloud.user.common.lock;
 import java.time.Instant;
 import java.util.Optional;
 
-import jakarta.enterprise.context.ApplicationScoped;
-
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import io.quarkus.mongodb.panache.PanacheMongoRepository;
+import jakarta.enterprise.context.ApplicationScoped;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class LockRepository implements PanacheMongoRepository<Lock> {
 
 	Optional<Lock> findLockBefore(Instant timestamp) {
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockService.java b/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockService.java
index 50c500471012f14332b7e521bb3ee10f2e83b48f..23a2f0e73209f6d563a0584e026e4d2c64053aae 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockService.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/common/lock/LockService.java
@@ -26,16 +26,15 @@ package de.ozgcloud.user.common.lock;
 import java.time.Instant;
 import java.time.temporal.ChronoUnit;
 
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.common.errorhandling.LockCreationException;
 import jakarta.enterprise.context.ApplicationScoped;
 import jakarta.inject.Inject;
-
-import de.itvsh.kop.common.logging.KopLogging;
 import lombok.extern.log4j.Log4j2;
 
 @Log4j2
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 public class LockService {
 
 	@Inject
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakApiService.java b/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakApiService.java
index 3cc6c2de9a8230b52459a97d17e3810444bd5b2d..e46070b2b70cb89ed772310d490d513d16fe8f1d 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakApiService.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakApiService.java
@@ -29,28 +29,27 @@ import java.util.function.Supplier;
 import java.util.stream.Stream;
 import java.util.stream.StreamSupport;
 
-import de.ozgcloud.user.common.errorhandling.KeycloakUnavailableException;
-import jakarta.enterprise.context.ApplicationScoped;
-import jakarta.inject.Inject;
-import jakarta.ws.rs.BadRequestException;
-import jakarta.ws.rs.ClientErrorException;
-import jakarta.ws.rs.NotFoundException;
-import jakarta.ws.rs.ProcessingException;
-
 import org.apache.commons.lang3.ObjectUtils;
 import org.eclipse.microprofile.config.inject.ConfigProperty;
 import org.keycloak.admin.client.resource.RealmResource;
 import org.keycloak.admin.client.resource.UserResource;
 import org.keycloak.representations.idm.UserRepresentation;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.RemoteUserIterator;
 import de.ozgcloud.user.User;
 import de.ozgcloud.user.UserResourceMapper;
+import de.ozgcloud.user.common.errorhandling.KeycloakUnavailableException;
+import jakarta.enterprise.context.ApplicationScoped;
+import jakarta.inject.Inject;
+import jakarta.ws.rs.BadRequestException;
+import jakarta.ws.rs.ClientErrorException;
+import jakarta.ws.rs.NotFoundException;
+import jakarta.ws.rs.ProcessingException;
 import lombok.extern.log4j.Log4j2;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 @Log4j2
 class KeycloakApiService {
 
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakUserRemoteService.java b/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakUserRemoteService.java
index bf0508c2904bac2a2f30e6b02b4b28a5aaa43e48..555b33c141b6d1b097db972028e25248bf9eeb68 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakUserRemoteService.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/keycloak/KeycloakUserRemoteService.java
@@ -26,14 +26,13 @@ package de.ozgcloud.user.keycloak;
 import java.util.Optional;
 import java.util.stream.Stream;
 
+import de.ozgcloud.common.logging.OzgCloudLogging;
+import de.ozgcloud.user.User;
 import jakarta.enterprise.context.ApplicationScoped;
 import jakarta.inject.Inject;
 
-import de.itvsh.kop.common.logging.KopLogging;
-import de.ozgcloud.user.User;
-
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 public class KeycloakUserRemoteService {
 
 	static final String ATTRIBUTE_NAME_OZG_CLOUD_USER_ID = "ozgCloudUserId";
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/organisationseinheit/OrganisationsEinheitRepository.java b/user-manager-server/src/main/java/de/ozgcloud/user/organisationseinheit/OrganisationsEinheitRepository.java
index 896fc8eb6f9be516e457a33fc6dafa63021092b6..fe0e7a35ccc0a4d9d289c6dc3fa6a093bbf32fd8 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/organisationseinheit/OrganisationsEinheitRepository.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/organisationseinheit/OrganisationsEinheitRepository.java
@@ -28,16 +28,15 @@ import static org.apache.commons.collections4.IterableUtils.*;
 
 import java.util.Collection;
 
-import jakarta.enterprise.context.ApplicationScoped;
-
 import com.mongodb.client.model.Filters;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.User;
 import io.quarkus.mongodb.panache.PanacheMongoRepository;
+import jakarta.enterprise.context.ApplicationScoped;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class OrganisationsEinheitRepository implements PanacheMongoRepository<User> {
 
 	public Collection<String> findAllOrganisationsEinheitIds() {
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/recipient/RecipientRepository.java b/user-manager-server/src/main/java/de/ozgcloud/user/recipient/RecipientRepository.java
index b64ac4c682be248505964150d4417d7cab5835b3..417e715de7e0aedead84a84a4484ee123c796f55 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/recipient/RecipientRepository.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/recipient/RecipientRepository.java
@@ -4,15 +4,14 @@ import static de.ozgcloud.user.User.*;
 
 import java.util.List;
 
-import de.ozgcloud.user.settings.NotificationsSendFor;
-import jakarta.enterprise.context.ApplicationScoped;
-
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.User;
+import de.ozgcloud.user.settings.NotificationsSendFor;
 import io.quarkus.mongodb.panache.PanacheMongoRepository;
+import jakarta.enterprise.context.ApplicationScoped;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class RecipientRepository implements PanacheMongoRepository<User> {
 
 	private static final String SEARCH_RECIPIENT_QUERY = ORGANISATIONS_EINHEIT_IDS_FIELD + " = ?1 and " + NOTIFICATION_SEND_FOR_FIELD + " = ?2";
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/settings/UserSettingsRepository.java b/user-manager-server/src/main/java/de/ozgcloud/user/settings/UserSettingsRepository.java
index b54e4c75fa6efa45c0c9b354e6d52a41751a4ce0..01edbf382d2f5a7084f038a03701df88fca96afb 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/settings/UserSettingsRepository.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/settings/UserSettingsRepository.java
@@ -25,16 +25,15 @@ package de.ozgcloud.user.settings;
 
 import java.util.Optional;
 
-import jakarta.enterprise.context.ApplicationScoped;
-
 import org.bson.types.ObjectId;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.User;
 import io.quarkus.mongodb.panache.PanacheMongoRepository;
+import jakarta.enterprise.context.ApplicationScoped;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class UserSettingsRepository implements PanacheMongoRepository<User> {
 
 	public Optional<UserSettings> updateByUserId(String userId, UserSettings userSettings) {
diff --git a/user-manager-server/src/main/java/de/ozgcloud/user/sync/SyncService.java b/user-manager-server/src/main/java/de/ozgcloud/user/sync/SyncService.java
index ad9ad6fa048f7e19cdcdf8fa0f6ba44c3744d4ad..498cde4566d1679d0f6ade9aa89ad8c9d5c22129 100644
--- a/user-manager-server/src/main/java/de/ozgcloud/user/sync/SyncService.java
+++ b/user-manager-server/src/main/java/de/ozgcloud/user/sync/SyncService.java
@@ -25,18 +25,17 @@ package de.ozgcloud.user.sync;
 
 import java.util.function.Predicate;
 
-import de.ozgcloud.user.keycloak.KeycloakUserRemoteService;
-import jakarta.enterprise.context.ApplicationScoped;
-import jakarta.inject.Inject;
-
 import org.apache.commons.collections4.CollectionUtils;
 
-import de.itvsh.kop.common.logging.KopLogging;
+import de.ozgcloud.common.logging.OzgCloudLogging;
 import de.ozgcloud.user.User;
 import de.ozgcloud.user.UserService;
+import de.ozgcloud.user.keycloak.KeycloakUserRemoteService;
+import jakarta.enterprise.context.ApplicationScoped;
+import jakarta.inject.Inject;
 
 @ApplicationScoped
-@KopLogging
+@OzgCloudLogging
 class SyncService {
 
 	private final Predicate<User> HAS_ANY_ROLE = user -> CollectionUtils.isNotEmpty(user.getRoles());// NOSONAR